Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.221.207.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.221.207.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:45:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 14.207.221.55.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 55.221.207.14.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
121.132.132.73 attack
Invalid user ubnt from 121.132.132.73 port 40023
2020-05-24 03:49:14
212.225.165.230 attack
Invalid user pi from 212.225.165.230 port 42272
2020-05-24 04:09:17
2.36.136.146 attackspambots
Repeated brute force against a port
2020-05-24 03:35:25
1.10.130.231 attackbots
Invalid user support from 1.10.130.231 port 61419
2020-05-24 04:05:58
216.206.86.101 attackbotsspam
Invalid user scn from 216.206.86.101 port 44527
2020-05-24 03:36:03
106.52.56.26 attackbotsspam
Invalid user mer from 106.52.56.26 port 58750
2020-05-24 03:55:07
106.13.102.141 attack
(sshd) Failed SSH login from 106.13.102.141 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 23 12:26:27 host sshd[50808]: Invalid user dec from 106.13.102.141 port 37460
2020-05-24 03:55:47
213.102.91.196 attackbotsspam
May 23 16:08:29 master sshd[10918]: Failed password for root from 213.102.91.196 port 20456 ssh2
May 23 16:08:35 master sshd[10921]: Failed password for root from 213.102.91.196 port 20534 ssh2
2020-05-24 04:09:01
210.245.34.243 attackspam
Invalid user rzs from 210.245.34.243 port 42239
2020-05-24 04:10:14
165.227.69.39 attackspam
Invalid user sed from 165.227.69.39 port 35564
2020-05-24 03:42:57
192.3.139.56 attack
15653/tcp 5604/tcp 24427/tcp...
[2020-04-04/05-22]141pkt,49pt.(tcp)
2020-05-24 04:11:03
114.45.75.120 attack
Invalid user osmc from 114.45.75.120 port 53010
2020-05-24 03:53:18
180.222.12.79 attackspambots
Invalid user pi from 180.222.12.79 port 44560
2020-05-24 04:12:20
221.0.94.20 attackbots
SSH brute-force attempt
2020-05-24 03:35:45
83.233.155.75 attackspam
Invalid user pi from 83.233.155.75 port 48075
2020-05-24 03:58:01

Recently Reported IPs

93.71.204.188 75.253.194.229 215.65.246.231 175.89.243.189
240.30.94.175 76.204.253.108 247.133.161.90 97.91.70.113
51.1.239.117 213.84.197.178 181.254.20.132 84.50.70.210
78.250.74.53 250.171.115.136 39.224.229.242 32.108.123.119
255.227.176.90 58.213.9.89 75.140.70.185 122.38.19.211